网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()
A
denial of service
B
brute force
C
reconnaissance
D
Trojan horse
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A denial of serviceB brute forceC reconnaissanceD Trojan horse” 相关考题
考题
Once the TCP connection is established, which message type initiates the BGP peering process?()
A. OpenB. ActiveC. UpdateD. Notification
考题
Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()
A. Active Flow PipeliningB. Fast Connection SetupC. TCP Acceleration (AFP)D. Forward Error Correction
考题
A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()
A. Packet snifferB. MultimeterC. Load balancerD. Throughput tester
考题
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()
A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse
考题
Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。
A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse
考题
Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A、 Man-in-themiddle attackB、 Spoof attackC、 Land.C attackD、 Buffer OverflowE、 Day zero attackF、 Trojan Horse
考题
How would you characterize the source and type in a denial of service attack on a router?()A、By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB、By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underwayC、By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD、By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail
考题
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse
考题
Which software-based security threat is typically spread from user to user via e-mail?()A、VirusB、Trojan horseC、Denial of serviceD、Data interception
考题
BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack
考题
Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack
考题
What are four methods used by hackers? ()A、footprint analysis attackB、privilege escalation attackC、buffer Unicode attackD、social engineering attackE、front door attacksF、Trojan horse attack
考题
Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse
考题
A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()A、Packet snifferB、MultimeterC、Load balancerD、Throughput tester
考题
Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、Notification
考题
Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()A、Active Flow PipeliningB、Fast Connection SetupC、TCP Acceleration (AFP)D、Forward Error Correction
考题
Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、KeepaliveE、Notification
考题
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server. Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP
考题
单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A
DoSB
SYN floodC
port scanningD
IP address sweep
考题
单选题Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?()A
denial of serviceB
brute forceC
reconnaissanceD
Trojan horse
考题
单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A
close-connectionB
terminate-connectionC
close-client-and-serverD
terminate-session
考题
单选题Once the TCP connection is established, which message type initiates the BGP peering process?()A
OpenB
ActiveC
UpdateD
KeepaliveE
Notification
考题
单选题How would you characterize the source and type in a denial of service attack on a router?()A
By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB
By performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underwayC
By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD
By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail
考题
单选题Which statement is true about a Smurf attack?()A
It sends ping requests in segments of an invalid sizeB
It intercepts the third step in a TCP three-way handshake to hijack a sessionC
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD
It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack
考题
单选题Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A
Man-in-themiddle attackB
Spoof attackC
Land.C attackD
Buffer OverflowE
Day zero attackF
Trojan Horse
考题
单选题Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server. Which type of connection should you configure? ()A
IPSECB
L2TPC
PPTPD
SSTP
考题
单选题Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()A
Active Flow PipeliningB
Fast Connection SetupC
TCP Acceleration (AFP)D
Forward Error Correction
热门标签
最新试卷